亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? modsib-x86.c

?? It s a Linux disassemble, can set break point, disassemble ELF file.
?? C
?? 第 1 頁(yè) / 共 2 頁(yè)
字號(hào):
/* * libDASM * * Copyright (C) 2000-2003 Patrick Alken * This library comes with absolutely NO WARRANTY * * Should you choose to use and/or modify this source code, please * do so under the terms of the GNU General Public License under which * this library is distributed. * * $Id: modsib-x86.c,v 1.1.1.1 2004/04/26 00:40:18 pa33 Exp $ * * This module contains routines used to process/lookup ModR/M * and SIB byte information. *//* * Some general info on ModR/M and SIB bytes to remind myself * from time to time: * * A ModR/M byte is constructed as follows: * * Bits: 7 6           5 4 3         2 1 0 *       Mod           Reg/Opcode    R/M * * Mod        = Combines with the R/M field * * Reg/Opcode = Either a register number or three more bits *              of opcode information * * R/M        = Either a register or combines with Mod to form *              an effective address * * A SIB byte is constructed in the following manner: * * Bits:  7 6          5 4 3         2 1 0 *        Scale        Index         Base * * Scale = A number (0-3) that you must raise 2 to in order to *         determine the scaling factor * * Index = A number (0-7) which tells you the effective address *         of the SIB byte. I have placed these values in SibTable[]. * * Base  = A number (0-7) which tells you the register to use as *         the base register. I have placed these registers in *         x86SibBaseRegisters[]. */#include <stdio.h>#include <assert.h>#include "common-x86.h"#include "modsib-x86.h"#include "operands-x86.h"/* * Top-level includes */#include "libDASM.h"static struct x86ModAddrInfo *x86getModAddress(struct disasmWorkspace *ws,                                               unsigned char mod,                                               unsigned char reg,                                               unsigned char rm);static unsigned int x86getModSibDisplacement(unsigned char *data, int numBytes);static int x86hasEffectiveOperand(struct x86OpCode *opPtr);/* * This corresponds to table 2-1 in the IAS, Vol 2. The first * index corresponds to the mod field. The second index corresponds * to the r/m field. */static struct x86ModAddrInfo x86ModTable16[MAX_MOD][MAX_RM] = {  /* MOD = 0 */  {    { M_BX_SI, 0 },    { M_BX_DI, 0 },    { M_BP_SI, 0 },    { M_BP_DI, 0 },    { M_SI, 0 },    { M_DI, 0 },    { M_NONE, MF_DISP16 },    { M_BX, 0 }  },  /* MOD = 1 */  {    { M_BX_SI, MF_DISP8 },    { M_BX_DI, MF_DISP8 },    { M_BP_SI, MF_DISP8 },    { M_BP_DI, MF_DISP8 },    { M_SI, MF_DISP8 },    { M_DI, MF_DISP8 },    { M_BP, MF_DISP8 },    { M_BX, MF_DISP8 }  },  /* MOD = 2 */  {    { M_BX_SI, MF_DISP16 },    { M_BX_DI, MF_DISP16 },    { M_BP_SI, MF_DISP16 },    { M_BP_DI, MF_DISP16 },    { M_SI, MF_DISP16 },    { M_DI, MF_DISP16 },    { M_BP, MF_DISP16 },    { M_BX, MF_DISP16 }  },  /*   * MOD = 3   *   * When mod is 3, the r/m field specifies a register rather   * than a memory address. The actual register depends on   * the bit size of the operand, so we cannot encode it here.   * The determination of the actual register will be made later   * when we construct the arguments. ie: if we come across   * an operand r/m8 with a ModR/M byte with a mod of 3, we will   * use an 8 bit register, which will be uniquely determined with   * the r/m value.   */  {    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER }  }};/* * This corresponds to table 2-2 in the IAS, Vol 2. The first * index corresponds to the mod field. The second index corresponds * to the r/m field. */static struct x86ModAddrInfo x86ModTable32[MAX_MOD][MAX_RM] = {  /* MOD = 0 */  {    { M_EAX, 0 },    { M_ECX, 0 },    { M_EDX, 0 },    { M_EBX, 0 },    { M_NONE, MF_SIB },    { M_NONE, MF_DISP32 },    { M_ESI, 0 },    { M_EDI, 0 }  },  /* MOD = 1 */  {    { M_EAX, MF_DISP8 },    { M_ECX, MF_DISP8 },    { M_EDX, MF_DISP8 },    { M_EBX, MF_DISP8 },    { M_NONE, MF_SIB|MF_DISP8 },    { M_EBP, MF_DISP8 },    { M_ESI, MF_DISP8 },    { M_EDI, MF_DISP8 }  },  /* MOD = 2 */  {    { M_EAX, MF_DISP32 },    { M_ECX, MF_DISP32 },    { M_EDX, MF_DISP32 },    { M_EBX, MF_DISP32 },    { M_NONE, MF_SIB|MF_DISP32 },    { M_EBP, MF_DISP32 },    { M_ESI, MF_DISP32 },    { M_EDI, MF_DISP32 }  },  /*   * MOD = 3   *   * When mod is 3, the r/m field specifies a register rather   * than a memory address. The actual register depends on   * the bit size of the operand, so we cannot encode it here.   * The determination of the actual register will be made later   * when we construct the arguments. ie: if we come across   * an operand r/m8 with a ModR/M byte with a mod of 3, we will   * use an 8 bit register, which will be uniquely determined with   * the r/m value.   */  {    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER },    { -1, MF_REGISTER }  }};/* * The following x86ModRegisters*[] arrays are used when the ModR/M * byte specifies a register instead of a memory address. This * occurs when we are dealing with r8/r16/r32 operands or with * rm8/rm16/rm32 operands with a MOD of 3 (see above) */static int x86ModRegisters8[] = {  M_AL,  M_CL,  M_DL,  M_BL,  M_AH,  M_CH,  M_DH,  M_BH};static int x86ModRegisters16[] = {  M_AX,  M_CX,  M_DX,  M_BX,  M_SP,  M_BP,  M_SI,  M_DI};static int x86ModRegisters32[] = {  M_EAX,  M_ECX,  M_EDX,  M_EBX,  M_ESP,  M_EBP,  M_ESI,  M_EDI};/* * All possible address offsets for ModR/M bytes: this array * is indexed by the M_xxx values */static char *x86ModAddrOffsets[] = {  "ah",  "al",  "ax",  "bh",  "bl",  "bp",  "bx",  "bp+di",  "bp+si",  "bx+di",  "bx+si",  "ch",  "cl",  "cx",  "dh",  "di",  "dl",  "dx",  "eax",  "ebp",  "ebx",  "ecx",  "edi",  "edx",  "esi",  "esp",  "mm0",  "mm1",  "mm2",  "mm3",  "mm4",  "mm5",  "mm6",  "mm7",  "si",  "sp",  "xmm0",  "xmm1",  "xmm2",  "xmm3",  "xmm4",  "xmm5",  "xmm6",  "xmm7",  ""        /* M_NONE */};/* * This array corresponds to table 2-3 in the IAS, Vol 2. * We need to store less information than in the ModR/M case * because there are only 8 possible memory offsets. Only * the scale factor changes as we go to higher values of the * SIB byte. */struct x86ModAddrInfo x86SibTable[1][8] = {  {    { M_EAX, 0 },    { M_ECX, 0 },    { M_EDX, 0 },    { M_EBX, 0 },    { M_NONE, 0 },    { M_EBP, 0 },    { M_ESI, 0 },    { M_EDI, 0 }  }};/* * SIB base registers - indexed by 'base' field of SIB byte */static char *x86SibBaseRegisters[] = {  "eax",  "ecx",  "edx",  "ebx",  "esp",  "ebp",  "esi",  "edi"};/*x86processModSib()  Called from x86findOpCode() when a prospective match requires aModR/M (and possibly a SIB) byte. This routine makes sure thebyte in the actual opcode data stream is a valid ModR/M byte forthe given prospective match. If so, it then computes the address(es)and displacements specified by the ModR/M (and SIB) byte(s).Inputs: ws     - disasm workspace        data   - actual opcode data we are trying to disassemble: it                 should point to the ModR/M byte        opPtr  - pointer to prospective opcode match

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91黄色激情网站| 日韩欧美激情在线| 青草av.久久免费一区| 337p粉嫩大胆色噜噜噜噜亚洲| 91在线观看高清| 紧缚奴在线一区二区三区| 亚洲欧美另类久久久精品| 精品国产乱码久久久久久夜甘婷婷 | 97aⅴ精品视频一二三区| 蜜臀av一区二区在线观看 | 国产亚洲一区二区三区四区| 欧美在线观看一二区| 国产98色在线|日韩| 三级久久三级久久久| 亚洲欧洲精品天堂一级| 精品精品欲导航| 欧美色国产精品| 99精品黄色片免费大全| 国产精品一区二区无线| 日韩成人午夜电影| 一区二区三区高清在线| 国产精品人人做人人爽人人添| 日韩欧美中文字幕制服| 精品视频免费看| 成人福利视频在线看| 国产曰批免费观看久久久| 日本欧美肥老太交大片| 午夜电影网亚洲视频| 亚洲人成亚洲人成在线观看图片| wwwwww.欧美系列| 日韩精品中文字幕在线不卡尤物| 欧美性欧美巨大黑白大战| 色综合激情久久| 99久久夜色精品国产网站| 一本到三区不卡视频| 国产69精品久久99不卡| 国产乱码精品一区二区三区五月婷| 亚洲高清免费观看 | 亚洲另类中文字| 亚洲四区在线观看| 亚洲区小说区图片区qvod| 亚洲欧洲三级电影| 国产欧美一区二区精品性色超碰 | 国产精品久久精品日日| 欧美国产丝袜视频| 国产精品嫩草影院com| 国产精品久久毛片a| 国产精品电影一区二区| 亚洲色图制服诱惑| 一区二区三区四区高清精品免费观看 | 国产欧美视频在线观看| 国产欧美一区二区精品婷婷| 国产色一区二区| 中文字幕亚洲在| 亚洲精品大片www| 亚洲成国产人片在线观看| 亚洲一区二区三区四区在线观看 | 日韩欧美电影在线| 2023国产精品视频| 国产精品久线在线观看| 亚洲精品国产精华液| 亚洲成人av福利| 裸体在线国模精品偷拍| 国产**成人网毛片九色 | 91精品国产综合久久香蕉麻豆| 欧美一区二区三区色| 精品国产免费久久| 国产精品久久久久天堂| 亚洲一区在线视频| 青青草97国产精品免费观看| 国产精品一区免费视频| 91麻豆swag| 欧美一区2区视频在线观看| 久久青草欧美一区二区三区| 亚洲视频在线观看三级| 丝袜美腿亚洲一区| 国产成人精品亚洲日本在线桃色 | 亚洲国产成人av| 精品影视av免费| 成人理论电影网| 欧美二区乱c少妇| 国产欧美一区二区三区沐欲| 亚洲一区二区av在线| 九色综合狠狠综合久久| 99综合电影在线视频| 正在播放亚洲一区| 欧美国产日韩一二三区| 亚洲国产一区二区a毛片| 久久99精品久久久久久久久久久久 | 久久伊99综合婷婷久久伊| 中文字幕日韩一区| 免费看欧美女人艹b| 91蜜桃免费观看视频| 日韩精品一区二区三区四区视频 | 欧美四级电影网| 久久久精品一品道一区| 亚洲网友自拍偷拍| 成人免费视频视频在线观看免费| 欧美男女性生活在线直播观看| 久久久影院官网| 日本三级亚洲精品| 在线免费av一区| 久久久美女艺术照精彩视频福利播放| 亚洲少妇30p| 国产成人福利片| 91麻豆精品国产91久久久久久久久| 中文字幕亚洲电影| 国产精品中文字幕欧美| 欧美丰满一区二区免费视频| 中文字幕亚洲欧美在线不卡| 韩国v欧美v日本v亚洲v| 91精品国产色综合久久久蜜香臀| 日韩毛片在线免费观看| 国产激情精品久久久第一区二区| 91麻豆精品国产无毒不卡在线观看| 亚洲三级在线免费| 成人免费视频免费观看| 久久久久久久久久久久久久久99| 日韩av电影一区| 欧美三级三级三级| 亚洲视频在线一区| av色综合久久天堂av综合| 久久久亚洲精品一区二区三区 | 免费在线欧美视频| 欧美少妇一区二区| 亚洲一区中文在线| 91国产精品成人| 夜夜精品视频一区二区| 99久久国产免费看| 中文字幕一区视频| 99久久精品免费观看| 国产精品不卡在线| 岛国一区二区三区| 欧美高清一级片在线观看| 高清在线观看日韩| 日本一二三不卡| 成人一区二区三区在线观看| 国产午夜久久久久| 国产高清在线精品| 国产精品久久久久aaaa樱花| 高清不卡一二三区| 国产精品久久毛片a| 91麻豆成人久久精品二区三区| 亚洲私人黄色宅男| 欧美日精品一区视频| 三级影片在线观看欧美日韩一区二区| 7777精品伊人久久久大香线蕉完整版 | 午夜亚洲国产au精品一区二区| 欧美精品亚洲二区| 日韩av一区二区在线影视| 欧美大尺度电影在线| 激情欧美一区二区| 亚洲国产精品黑人久久久| 97精品久久久午夜一区二区三区| 亚洲女同ⅹxx女同tv| 欧美日韩一级视频| 美女爽到高潮91| 欧美韩国一区二区| 欧美最猛黑人xxxxx猛交| 婷婷综合五月天| 精品日韩一区二区| 成人高清视频在线| 一区二区日韩av| 欧美一级片免费看| 夫妻av一区二区| 亚洲另类在线制服丝袜| 在线观看91av| 国产主播一区二区三区| 国产精品乱码人人做人人爱| 欧美性猛交一区二区三区精品| 男女男精品视频| 国产精品久久久久久亚洲毛片| 欧美在线影院一区二区| 蜜臀久久99精品久久久画质超高清| 26uuu精品一区二区| 91官网在线观看| 国模一区二区三区白浆| 中文字幕一区免费在线观看| 91精品国产乱码| eeuss鲁一区二区三区| 视频在线观看一区二区三区| 国产日韩欧美一区二区三区乱码| 欧美亚洲精品一区| 国产乱码精品一品二品| 亚洲最大成人网4388xx| 精品国产免费视频| 欧美中文字幕一区二区三区亚洲| 国内精品自线一区二区三区视频| 亚洲免费观看高清完整版在线观看| 91精品婷婷国产综合久久性色| 成人丝袜18视频在线观看| 日本中文字幕不卡| 亚洲三级在线免费| 2023国产精华国产精品| 91福利国产精品| 懂色av中文字幕一区二区三区 | 激情五月婷婷综合网| 一区二区三区中文字幕电影| 久久品道一品道久久精品| 欧美日韩aaaaaa|